UCSMssp: Ubiquitous Computing Service Model Based on SPKI/SDSI and P2P

被引:0
|
作者
Sun, Daoqing [1 ]
Pu, Fang [1 ]
Cao, Qiying [1 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
关键词
Peer-to-Peer; Security; Service Model; SPKI/SDSI; Ubiquitous Computing;
D O I
10.1109/WCICA.2008.4593373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service types and levels, the security delegation of services and the identity hiding of principal etc are all these unsolved problems. In this paper, UCSMssp, a new novel ubiquitous computing service model based on SPKI/SDSI and P2P is presented. SPKI-based authorization is exploited in UCSMssp to solve above problems in small-scale ubiquitous computing environments. The DHT and flooding or random walk technology of Peer-to-Peer overlay network over the Internet is expanded to solve the routing search in large-scale ubiquitous computing environments. The architecture of ubiquitous computing environment, the service authorization processes and the service supply processes etc of UCSMssp are described in the paper. The performance analysis shows that UCSMssp is a suitable security solution used in large-scale ubiquitous computing environments.
引用
收藏
页码:2822 / 2827
页数:6
相关论文
共 50 条
  • [41] Research on P2P computing model of load flow computation
    School of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
    不详
    不详
    Gaodianya Jishu, 2007, 3 (32-36):
  • [42] Efficient data dissemination in mobile P2P ad-hoc networks for ubiquitous computing
    Kim, Do Hoon
    Lee, Myoung Rak
    Han, Longzhe
    In, Hoh Peter
    MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 384 - 389
  • [43] Greedysearch based service location in P2P networks
    Zhu Cheng
    JournalofSystemsEngineeringandElectronics, 2005, (04) : 886 - 893
  • [44] P2P Based Service Provisioning on Distributed Resources
    Mistry, Sujoy
    Jaiswal, Dibyanshu
    Mukherjee, Arijit
    Mukherjee, Nandini
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (03): : 198 - 221
  • [45] A P2P Network Based Architecture for Web Service
    Wang, Zhenqi
    Hu, Yuanyuan
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3446 - 3449
  • [46] Social computing-based trust model in P2P E-Commerce
    Xie, Fu
    Liu, Fengming
    Wang, Xincheng
    Yang, Rongrong
    PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 789 - +
  • [47] Research of Trust Model in P2P Network Based on Trusted Computing0
    Rong, Li
    Lei, Li
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [48] P2P Service Performance Analysis of Unstructured P2P Network
    Mao, JunPeng
    Cui, YanLi
    Huang, JianHua
    Zhang, JianBiao
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 50 - +
  • [49] Convergence P2P cloud computing
    Jo, Sunmoon
    Han, Jungsoo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (06) : 1153 - 1155
  • [50] P2P computing for intelligence of things
    Jo, Sunmoon
    Lee, Jieun
    Han, Jungsoo
    Ghose, Supratip
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (02) : 575 - 578